7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.367 Low
EPSS
Percentile
97.1%
A vulnerability in the way Clam AntiVirus processes Portable Executable (PE) files may lead to execution of arbitrary code.
Clam AntiVirus is a GPL virus scanner that has built-in support for for a number of file types including PE. According to iDefense Public Advisory: 10.15.06:
While processing certain PE elements, two variables can be very large and integer overflow could occur. This would result in less memory being allocated than was expected by the programmer and subsequent code would overflow the heap buffer.
Note that an attacker must send a specially crafted PE file through any email gateway or personal anti-virus client that employs the Clam AntiVirus scanning engine in order to exploit this vulnerability.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
Update
Clam AntiVirus has released an updated version to address this issue. Refer to File Release Notes and Changelog for Clam AntiVirus 0.88.5.
180864
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: October 27, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to File Release Notes and Changelog for Clam AntiVirus 0.88.5.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180864 Feedback>).
Updated: October 27, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Debian Security Advisory DSA-1196-1.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180864 Feedback>).
Updated: October 27, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Gentoo Linux Security Advisory 200610-10.xml.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180864 Feedback>).
Updated: October 27, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Mandriva Linux Security Advisory MDKSA-2006:184.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180864 Feedback>).
Updated: October 27, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to http://www.novell.com/linux/security/advisories/2006_60_clamav.html.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180864 Feedback>).
Updated: October 27, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to Trustix Secure Linux Security Advisory #2006-0057.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23180864 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This issue was reported in File Release Notes and Changelog for Clam AntiVirus 0.88.5.
This document was written by Chris Taschner.
CVE IDs: | CVE-2006-4182 |
---|---|
Severity Metric: | 10.40 Date Public: |
kolab.org/security/kolab-vendor-notice-13.txt
labs.idefense.com/intelligence/vulnerabilities/display.php?id=422
secunia.com/advisories/22370
secunia.com/advisories/22421
secunia.com/advisories/22488
secunia.com/advisories/22498
secunia.com/advisories/22537
securitytracker.com/id?1017068
www.frsirt.com/english/advisories/2006/4034
www.frsirt.com/english/advisories/2006/4136
www.securityfocus.com/bid/20535
xforce.iss.net/xforce/xfdb/29607